Lock screen security for Android

Keyboard Shortcuts

Security on a mobile device begins at the lock screen. Ryan Spence explains how to secure the lock screen on an Android device. Understand why locking your device with a password is the most secure option. Understand the benefits and shortcomings of fingerprint sensors, to implement the strongest security.

- Even if I have set up strong access security,…mobile devices present data vulnerabilities…before access is even granted.…The lock screens themselves present risks…as they offer functionality and information…before the need to authenticate.…I want to make sure my lock screen…is setting me up for success.…First, let's answer the question of when to lock.…If I go to Apps, Settings, select Lock screen,…I'll then scroll down and select Secured lock time.…

Secured lock time gives us a wide variety of options…when the lock screen will automatically be engaged.…I can have it engaged immediately…after the phone goes to sleep,…or several different increments of time…between 15 seconds to one hour of inactivity.…This makes the question how much inactivity time…should I have before the phone automatically locks?…This depends on the way I use my device.…It can become quite annoying if I need…to constantly enter my password or fingerprint,…but an unlocked phone is an insecure phone.…

Therefore, I recommend setting this to no more…

Resume Transcript Auto-Scroll

Author

Released

12/24/2015

Get a practical, hands-on approach to mobile security: securing your Android or iOS phone or tablet against hackers, thieves, and snoops. Mobile expert Ryan Spence explains the importance of securing a mobile device in today's risky technological landscape, and covers some general topics: choosing and safely disposing of devices, using passwords, and backing up device data. He will then cover the specifics of securing the two most common mobile operating systems: Android and iOS. Finally, he'll show how to secure the physical components of your device, including the camera, microphone, and radios.

Topics include:

Understanding mobile security risks

Buying and disposing of mobile devices

Setting up mobile passwords

Implementing lock screen security

Adjusting Android admin settings and iOS privacy options

Setting up options to find your phone

Securing cameras, microphones, and other hardware on your mobile device